Lucene search

K
gentooGentoo FoundationGLSA-200804-03
HistoryApr 05, 2008 - 12:00 a.m.

OpenSSH: Privilege escalation

2008-04-0500:00:00
Gentoo Foundation
security.gentoo.org
36

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

75.2%

Background

OpenSSH is a complete SSH protocol implementation that includes an SFTP client and server support.

Description

Two issues have been discovered in OpenSSH:

  • Timo Juhani Lindfors discovered that OpenSSH sets the DISPLAY variable in SSH sessions using X11 forwarding even when it cannot bind the X11 server to a local port in all address families (CVE-2008-1483).
  • OpenSSH will execute the contents of the β€œ.ssh/rc” file even when the β€œForceCommand” directive is enabled in the global sshd_config (CVE-2008-1657).

Impact

A local attacker could exploit the first vulnerability to hijack forwarded X11 sessions of other users and possibly execute code with their privileges, disclose sensitive data or cause a Denial of Service, by binding a local X11 server to a port using only one address family. The second vulnerability might allow local attackers to bypass intended security restrictions and execute commands other than those specified by β€œForceCommand” if they are able to write to their home directory.

Workaround

There is no known workaround at this time.

Resolution

All OpenSSH users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7_p1-r6"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/openssh<Β 4.7_p1-r6UNKNOWN

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

75.2%